10. Cross sitescripting:-
• Definition ofCross-site scripting (XSS)
• Examples of such code include HTML code and
client-side scripts.
• An exploitedXSS vulnerabilitycan be used by
attackers to bypass access controls.
12. Bot Networks:-
• Remotely take control of computers without the users
realizing it
• Download maliciouscodes
• increase the speed and breadth of their attacks.
• Backdoor
• Problems fororganizations
14. Obscene or offensivecontent:-
• Communications may beillegal.
• Unlawful varies greatly between countries, and
even withinnations.
• It is a sensitive area
• Internetpornography
• Altering in an unauthorized way
18. Cyberterrorism:-
• Definition
• Increase in Internetproblems and server scans
since early2001.
• Groups to map potential security holes in critical
systems.
• How cyberterrorist works ?
• Cyber extortion is a form of cyber terrorism
22. CyberCrime PreventionTechnique:-
Use StrongPasswords
Secure yourcomputer
Be Social-MediaSavvy
Secure your Mobile Device
Install the latest operating system updates
Protect yourData
Secure your wireless network
Protect youre-identity
Avoid beingscammed
Call the right person for help
23. Future aboutCyberCrime:-
•Smart is the KEY for allhome appliance’s
•Drawbacks of advanced techniques
•Hacking yourcar
•Unauthorized Cloudaccess
•Digital Kidnapping